Hi,

 

In the iptables status output you sent below, you have TCP as the
protocol. I think that should be UDP. Our iptables status' output reads
like this:

...
Table: nat

Chain PREROUTING (policy ACCEPT)

num  target     prot opt source               destination         

1    DNAT       udp  --  w.x.y.z        0.0.0.0/0           udp dpt:5060
to:a.b.c.d:5080

...

 

Can you please dblcheck if you have UDP in the /etc/sysconfig/iptables
file?

BR,

Chris

 

________________________________

From: Michael Scheidell [mailto:michael.scheid...@secnap.com] 
Sent: Friday, August 20, 2010 1:19 PM
To: Sven Evensen
Cc: sipx-users@list.sipfoundry.org
Subject: Re: [sipx-users] iptables experts: port forwarding.

 

noop, that didn't do it.
remember, this is behind a firewall already, iptables isn't doing
natting.

ran system-config-securitylevel-tui
enabled firewall.

edited /etc/sysconfig/iptables to be what you had (ip's changed)

restarted iptables: /etc/init.d/iptables restart

/etc/init.d/iptables status shows: (i changed to tcp so I could test
with telnet)

/etc/init.d/iptables status
Table: nat
Chain PREROUTING (policy ACCEPT)
num  target     prot opt source               destination         
1    DNAT       tcp  --  xxx.xxx.xxx.36       0.0.0.0/0           tcp
dpt:5060 to:192.168.0.2:5080 

Chain POSTROUTING (policy ACCEPT)
num  target     prot opt source               destination         

Chain OUTPUT (policy ACCEPT)
num  target     prot opt source               destination         



on external host, did a telnet to public ip port 5060:

/usr/sbin/tshark -tad -s1500 -n -p  host xxx.xxx.xxx.36
2010-08-20 08:11:33.587745 xxx.xxx.xxx.36 -> 192.168.0.2    TCP 51532 >
5060 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=3 TSV=1337361266 TSER=0
2010-08-20 08:11:33.587807    192.168.0.2 -> xxx.xxx.xxx.36 TCP 5060 >
51532 [SYN, ACK] Seq=0 Ack=1 Win=5792 Len=0 MSS=1460 TSV=1084756872
TSER=1337361266 WS=7
2010-08-20 08:11:33.624719 xxx.xxx.xxx.36 -> 192.168.0.2    TCP 51532 >
5060 [ACK] Seq=1 Ack=1 Win=66608 Len=0 TSV=1337361298 TSER=1084756872

On 8/20/10 5:24 AM, Sven Evensen wrote: 

We use iptables on several of our machines to overcome the fact that
ITSP cannot send on 5060,

works perfectly. Here is our setup:

 

# Firewall configuration written by system-config-securitylevel

# Manual customization of this file is not recommended.

*nat

:OUTPUT ACCEPT [0:0]

:PREROUTING ACCEPT [0:0]

:POSTROUTING ACCEPT [0:0]

-A PREROUTING -p udp --dport 5060 -s 217.37.32.162 -i eth+ -j DNAT --to
10.227.122.31:5080

COMMIT

 

________________________________

From: sipx-users-boun...@list.sipfoundry.org
[mailto:sipx-users-boun...@list.sipfoundry.org] On Behalf Of Tony
Graziano
Sent: 20 August 2010 08:18
To: Michael Scheidell
Cc: sipx-users@list.sipfoundry.org users
Subject: Re: [sipx-users] iptables experts: port forwarding.

 

The startup scriptfor sipx checks to see if iptables is running, because
it is automatically "problematic" if it is...

On Thu, Aug 19, 2010 at 11:14 PM, Michael Scheidell
<michael.scheid...@secnap.com> wrote:

It just occurred to me that sipx on centos has iptables.  maybe not
active, but its got it.

can I use iptables, internally, without involving natting to do
selective port forwarding.

example:  
private ip address of 192.168.0.2  sipx.secnap.com. 
public ip of ITSP: 4.2.2.2

I want to do something like this:

if traffic comes in from source ip 4.2.2.2  to 192.168.0.2:5060
redirect it to 192.168.0.2:5080
(assuming that the original firewall did the natting. pretend here isn't
one)

all other traffic to 192.168.0.2:5060 goes to 192.168.0.2:5080
all traffic to 192.168.0.2:5080 goes to 192.168.0.2:5080.

pretend I know lots about freebsd and ipfw and just tonight figures out
how to type 'iptables --list'
eg: tutor me.
I am thinking that if this can be done, it might make life easier for
people like me and mitchel who can't get the ITSP to send to port 5080.

before I take m live phone system offline, look here, several paragraphs
down:
<http://www.linuxquestions.org/questions/linux-networking-3/iptables-por
t-forwarding-599401/>
<http://www.linuxquestions.org/questions/linux-networking-3/iptables-por
t-forwarding-599401/> 

they do something like this:




echo 1 > /proc/sys/net/ipv4/ip_forward
iptables -t nat -A PREROUTING -p tcp -s *route_only_for_this_ip* -d
*router_ip* --dport 80 -j DNAT --to *destination_ip*:*destination_port*
iptables -t nat -A POSTROUTING -o eth0 -d *destination_ip* -j SNAT
--to-source *router_ip*


so, echo 1 > /proc/sys/net/ipv4/ip_forward (might not be needed)
but 
iptables -t nat -A PREROUTING -p tcp -s 4.2.2.2 -d localhost --dport
5060 -j DNAT to localhost:5080

-- 
Michael Scheidell, CTO
o: 561-999-5000
d: 561-948-2259
ISN: 1259*1300
> | SECNAP Network Security Corporation 

*       Certified SNORT Integrator
*       2008-9 Hot Company Award Winner, World Executive Alliance
*       Five-Star Partner Program 2009, VARBusiness
*       Best in Email Security,2010: Network Products Guide
*       King of Spam Filters, SC Magazine 2008

 

________________________________

This email has been scanned and certified safe by SpammerTrap(r). 
For Information please see http://www.secnap.com/products/spammertrap/

________________________________

 


_______________________________________________
sipx-users mailing list
sipx-users@list.sipfoundry.org
List Archive: http://list.sipfoundry.org/archive/sipx-users/




-- 
======================
Tony Graziano, Manager
Telephone: 434.984.8430
sip: tgrazi...@voice.myitdepartment.net
Fax: 434.984.8431

Email: tgrazi...@myitdepartment.net

LAN/Telephony/Security and Control Systems Helpdesk:
Telephone: 434.984.8426
sip: helpd...@voice.myitdepartment.net
Fax: 434.984.8427

Helpdesk Contract Customers:
http://www.myitdepartment.net/gethelp/

Why do mathematicians always confuse Halloween and Christmas?
Because 31 Oct = 25 Dec.

 

-- 
Michael Scheidell, CTO
o: 561-999-5000
d: 561-948-2259
ISN: 1259*1300
> | SECNAP Network Security Corporation 

*                         Certified SNORT Integrator

*                         2008-9 Hot Company Award Winner, World
Executive Alliance

*                         Five-Star Partner Program 2009, VARBusiness

*                         Best in Email Security,2010: Network Products
Guide

*                         King of Spam Filters, SC Magazine 2008

 

________________________________

This email has been scanned and certified safe by SpammerTrap(r). 
For Information please see http://www.secnap.com/products/spammertrap/

________________________________

 

_______________________________________________
sipx-users mailing list
sipx-users@list.sipfoundry.org
List Archive: http://list.sipfoundry.org/archive/sipx-users/

Reply via email to